Quantum Defence Scalability

Quantum Computing

The notion of quantum computing has been around since the 1980s. Quantum computers, using computational methods fundamentally different from classical computers, are now
emerging from their neonatal state. They exist today. They are demonstrable. And other countries, especially China, are
investing very heavily in their development. What motivated the October 24, 2017 congressional hearing on
American Leadership in Quantum Technology? Among other concerns, existing private key / public key encryption systems are under threat from the rise of quantum computing. That's our credit cards!

Extreme Encryption in the current release features a count of over 10 to the power 623 (10623) unique keys
combined with pattern reduction that blocks identification of paths that might be eliminated.

10623 is a huge number. Consider that the best estimate of particles -- electrons, protons, etc. -- in the observable universe is 1080.

Quantum computers have a considerable way to go before they can test up to 10623 keys to get at the original
of one file or message.

Scalability

Extreme Encryption, Cyberian™ and Cyberian™ Tiger in their present configuration deal with six bits at
a time. If quantum computer hacking were to really take off, it is a straight-forward task
to shift our technology to deal with eight or
even ten bits at a time. Key counts would rise to 103548 or even 1018478 so that the odds can be even more secure for those that are really serious about privacy.

And if that is not enough, we can combine it with another of our inventions, Pryvit.
That combination amounts to scalability plus, privacy plus, probably for the lifespan of this universe and beyond. Nobody can prove that last
statement, but don't expect it to be disproved any time soon.